Cybersecurity

Google might’ve accidentally approved an ad for a Target gift card scam

Safari 15 bug can leak your recent browsing activity and personal identifiers

Russia’s FSB says it has taken down REvil hacker group at US request

‘Massive cyber attack’ hits Ukraine government websites as tensions with Russia escalate

The FCC proposes new data breach rules for phone companies

Google calls for new government action to protect open-source software projects

White House hosts tech summit to discuss open-source security after Log4j

Apple patches HomeKit denial-of-service bug with new iOS update

The latest phishing scam to watch out for: fraudulent QR codes on parking meters

A ransomware attack took a New Mexico jail offline, leaving inmates in lockdown

Open source developer corrupts widely-used libraries, affecting tons of projects

Victims of $200 million hack of BitMart crypto exchange still waiting to get their money back

Here’s the truth about the crypto miner that comes with Norton Antivirus

Some online accusations aren’t exactly correct, but that doesn’t mean it’s a good deal

Discord hacking is the newest threat for NFT buyers

Google is buying a company for half a billion dollars to boost cloud security

An Apple HomeKit bug can send iOS devices into a death spiral

LastPass says no passwords were compromised following breach scare

Another T-Mobile cyberattack reportedly exposed customer info and SIMs

Spyware scandal rocks Polish government

New analysis further links Pegasus spyware to Jamal Khashoggi murder

DuckDuckGo is working on a privacy-focused desktop browser

This security researcher fooled an at-home COVID-19 test using a Bluetooth hack

Meta cracks down on phishing scams that use its trademarks

Log4j is patched, but the exploits are just getting started

Comcast adds a Ring-style video doorbell to its Xfinity Home package

This ransomware may have stolen Christmas in cities, states, and companies across the US

How to use the iPhone’s new App Privacy Report

Researchers trigger new exploit by renaming an iPhone and a Tesla

‘Extremely bad’ vulnerability found in widely used logging system

Tribal communities are facing a new threat: Instagram

Viral photos are becoming a sore spot for protected sites

How to block and report text spam

No strategy is 100 percent effective, but you can stop much of it

Winning the war on ransomware